946 resultados para misleading and deceptive conduct


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although Design Science Research (DSR) is now an accepted approach to research in the Information Systems (IS) discipline, consensus on the methodology of DSR has yet to be achieved. Lack of a comprehensive and detailed methodology for Design Science Research (DSR) in the Information System (IS) discipline is a main issue. Prior research (the parent-study) aimed to remedy this situation and resulted in the DSR-Roadmap (Alturki et al., 2011a). Continuing empirical validation and revision of the DSR-Roadmap strives towards a methodology with appropriate levels of detail, integration, and completeness for novice researchers to efficiently and effectively conduct and report DSR in IS. The sub-study reported herein contributes to this larger, ongoing effort. This paper reports results from a formative evaluation effort of the DSR-Roadmap conducted using focus group analysis. Generally, participants endorsed the utility and intuitiveness of the DSR-Roadmap, while also suggesting valuable refinements. Both parent-study and sub-study make methodological contributions. The parent-study is the first attempt of utilizing DSR to develop a research methodology showing an example of how to use DSR in research methodology construction. The sub-study demonstrates the value of the focus group method in DSR for formative product evaluation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the systematic investigation of Twitter as a communications platform continues, the question of developing reliable comparative metrics for the evaluation of public, communicative phenomena on Twitter becomes paramount. What is necessary here is the establishment of an accepted standard for the quantitative description of user activities on Twitter. This needs to be flexible enough in order to be applied to a wide range of communicative situations, such as the evaluation of individual users’ and groups of users’ Twitter communication strategies, the examination of communicative patterns within hashtags and other identifiable ad hoc publics on Twitter (Bruns & Burgess, 2011), and even the analysis of very large datasets of everyday interactions on the platform. By providing a framework for quantitative analysis on Twitter communication, researchers in different areas (e.g., communication studies, sociology, information systems) are enabled to adapt methodological approaches and to conduct analyses on their own. Besides general findings about communication structure on Twitter, large amounts of data might be used to better understand issues or events retrospectively, detect issues or events in an early stage, or even to predict certain real-world developments (e.g., election results; cf. Tumasjan, Sprenger, Sandner, & Welpe, 2010, for an early attempt to do so).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Researchers from Queensland University of Technology have teamed up with the Australian Research Council (ARC), Screen Australia, The Australian Broadcasting Corporation (ABC), the Special Broadcasting Service (SBS) and the Australian Children’s Television Foundation (ACTF) to investigate the use of Australian screen content in primary, secondary and tertiary education. Over the next three years (2014-2016), researchers and investigators will undertake a national survey of schools and universities, and will conduct in-depth interviews with hundreds of industry representatives, teachers, principals, librarians and students. Furthermore, new approaches to developing screen content and curricula will be trialled. The project aims to develop a comprehensive picture of why, how, how much and where Australian screen content is used in education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is no doubt about it the practice of astroturfing is lazy, misleading and potentially illegal public relations (PR). But on social media, astroturfing is not just lazy and misleading, it can be irresponsible and damaging.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose To test the effects of a community-based physical activity intervention designed to increase physical activity and to conduct an extensive process evaluation of the intervention. Design Quasi-experimental. Setting Two rural communities in South Carolina. One community received the intervention, and the other served as the comparison. Subjects Public school students who were in fifth grade at the start of the study (558 at baseline) were eligible to participate. A total of 436 students participated over the course of the study. Intervention The intervention included after-school and summer physical activity programs and home, school, and community components designed to increase physical activity in youth. The intervention took place over an 18-month period. Measures. Students reported after-school physical activity at three data collection points (prior to, during, and following the intervention) using the Previous Day Physical Activity Recall (PDPAR). They also completed a questionnaire designed to measure hypothesized psychosocial and environmental determinants of physical activity behavior The process evaluation used meeting records, documentation of program activities, interviews, focus groups, and heart rate monitoring to evaluate the planning and implementation of the intervention. Results There were no significant differences in the physical activity variables and few significant differences in the psychosocial variables between the intervention and comparison groups. The process evaluation indicated that the after-school and summer physical activity component of the intervention was implemented as planned, but because of resource and time limitations, the home, school, and community components were not implemented as planned. Conclusions The intervention did not have a significant effect on physical activity in the target population of children in the intervention community. This outcome is similar to that reported in other studies of community-based physical activity intervention.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose My aim is to introduce, in the project management field, an Aristotelian ethics lens moving beyond the classical deontological and consequentialism approaches underlying the current ethical practices and codes of ethics and professional conducts. In doing so, I wish to pose the premises of a debate on the implications of a conscious ethical perspective for the structure and agency relationship within the project management field Design/methodology/approach Project management is a knowledge field on its own right. However the current perspectives applied to make sense and develop the field (modernism vs. postmodernism) leads to dichotomous thinking rather than recognizing the merits and contextual validity of both sides. I call for Aristotelian Ethics as a way of moving beyond this dichotomous thinking. I introduce briefly Aristotelian Ethics and its consequences in term of relation theory – practice, means and ends, facts and values, and finally politics (i.e. being part of a community of practitioners). Then I illustrate some consequences for the field taking PMI Code of Ethics and Professional Conduct and APM Code of Professional Conduct as supports for discussion Findings I suggest a need for revisiting and/or redesigning the codes of ethics and professional conducts for project management according to an Aristotelian perspective, in order to move beyond the normative limitations of classical deontological (conflict between competing duties, exemplified by PMI Code) or consequentialism (focusing on the "right" outcome to the detriment of duties, exemplified by APM Code) approaches (both, in fact, leading to a disconnection means and ends, and facts and values). This implicates shifting our view from the question "what is my duty?" to the questions "why should I undertake my duty?" and "how ought I act in this situation?" Practical implications Raising Professional Bodies, Industry and Education institutions awareness and consciousness and leading them to rethink about codes of ethics and the implications for the way they conceive practice and research, bodies of knowledge, credentialing, education... Originality/value To the best of my knowledge, this kind of discussion has not yet been conducted within the project management field, and considering the implication of project management in our life and for the well being of the society, an ethical debate may present some value(s)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Improving symptom management for palliative care patients has obvious benefits for patients and advantages for the clinicians, as workload demands and work-related stress can be reduced when the emergent symptoms of patients are managed in a timely manner. The use of emergency medication kits (EMKs) can provide such timely symptom relief. The purpose of this study was to conduct a survey of a local service to examine views on medication management before and after the implementation of an EMK and to conduct a nationwide prevalence survey examining the use of EMKs in Australia. Most respondents from community palliative care services indicated that EMKs were not being supplied to palliative care patients but believed such an intervention could improve patient care.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Careful study of various aspects presented in the note reveals basic fallacies in the concept and final conclusions.The Authors claim to have presented a new method of determining C-v. However, the note does not contain a new method. In fact, the method proposed is an attempt to generate settlement vs. time data using only two values of (t,8). The Authors have used a rectangular hyperbola method to determine C-v from the predicated 8- t data. In this context, the title of the paper itself is misleading and questionable. The Authors have compared C-v values predicated with measured values, both of them being the results of the rectangular hyperbola method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work combines the cognitive theory of folk-theoretical thought with the classical Aristotelian theory of artistic proof in rhetoric. The first half of the work discusses the common ground shared by the elements of artistic proof (logos, pathos, ethos) and the elements of folk-theoretical thought (naïve physics, folk biology, folk psychology, naïve sociology). Combining rhetoric with the cognitive theory of folk-theoretical thought creates a new point of view for argumentation analysis. The logos of an argument can be understood as the inferential relations established between the different parts of an argument. Consequently, within this study the analysis of logos is to be viewed as the analysis of the inferential folk-theoretical elements that make the suggested factual states-of-things appear plausible within given argumentative structures. The pathos of an argumentative structure can be understood as determining the quality of the argumentation in question in the sense that emotive elements play a great part in what can be called a distinction between good and deceptive rhetoric. In the context of this study the analysis of pathos is to be viewed as the analysis of the emotive content of argumentative structures and of whether they aim at facilitating surface- or deep cognitive elaboration of the suggested matters. The ethos of an argumentative structure means both the speaker-presentation and audience-construct that can be discerned within a body of argumentation. In the context of this study, the analysis of ethos is to be understood as the analysis of mutually manifest cognitive environments in the context of argumentation. The theory is used to analyse Catholic Internet discussion concerning cloning. The discussion is divided into six themes: Human Dignity, Sacred Family, Exploitation / Dehumanisation, Playing God, Monsters and Horror Scenarios and Ensoulment. Each theme is analysed for both the rhetorical and the cognitive elements that can be seen creating persuasive force within the argumentative structures presented. It is apparent that the Catholic voices on the Internet extensively oppose cloning. The voices utilise rhetoric that is aggressive and pejorative more often than not. Furthermore, deceptive rhetoric (in the sense presented above) plays a great part in argumentative structures of the Catholic voices. The theory of folk-theoretical thought can be seen as a useful tool for analysing the possible reasons why the Catholic speakers think about cloning and choose to present cloning in their argumentation as they do. The logos utilized in the argumentative structures presented can usually be viewed as based on folk-theoretical inference concerning biology and psychology. The structures of pathos utilized generally appear to aim at generating fear appeal in the assumed audiences, often incorporating counter-intuitive elements. The ethos utilised in the arguments generally revolves around Christian mythology and issues of social responsibility. These structures can also be viewed from the point of view of folk psychology and naïve sociological assumptions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tutkimuksessa tarkastellaan Ronald Inglehartin hiljaisen arvovallankumouksen teoriaa refleksiivisen modernisaatioteorian piiristä johdettujen vaihtoehtoisten yhteiskunnallisen epävarmuuden kasvuun liitty-vien selitysmallien kautta. Inglehartin teoria antaa ymmärtää, että modernisaation myötä käynnissä on ollut hiljainen prosessi, jossa aineellisen hyvinvoinnin ja turvallisuuden parissa kasvavat sukupolvet omaksuvat edeltäjiään jälkimaterialistisempia arvoja. Tutkimuksessa johdetaan Inglehartin teorialle kaksi rinnakkaista selitysmallia, jotka perustuvat Ulrich Beckin ja Anthony Giddensin modernisaatioteoretisoin-teihin. Ensimmäisessä mallissa Inglehartin määrittämää jälkimaterialismia pyritään selittämään Giddensin teorian avulla modernisaation myötä tapahtuvan traditioiden purkautumisen myötä yksilötasolla ilmenevän uudenlaisen autonomian kokemisen kautta, jolloin jälkimaterialismin oletetaan olevan yleisempää sellais-ten ihmisten keskuudessa, jotka traditioista irtautuessaan kykenevät onnistuneeseen itsereflektioon. Empiiristä mallinnusta varten koostetaan faktorianalyysillä kaksi Giddensin teoriaan perustuvaa jälkima-terialismia selittävää muuttujaa, joiden välinen yhteisvaikutus on tilastollisen analyysin keskiössä. Toinen malli perustuu Beckin riskiyhteiskuntateoretisointiin ja perustuu pitkälle kehittyneen modernisaa-tion mukanaan tuomien uudenlaisten riskien ja epävarmuuksien kokemiseen ja olettaa, että huolestunei-suus uudenlaisten riskien ja epävarmuuksien suhteen näkyy suurempana materialististen arvojen omak-sumisena. Selitysmalleja testataan empiirisesti ordinaalisella regression- sekä kovarianssianalyysillä World Values Survey 2005:n, European Values Study 2008:n sekä saksalaisen Political Attitudes, Political Participati-on and Voter Conduct in United Germany –surveyn vuosien 1994-2002 aineistoilla. Empiirisen analyysin perusteella kumpaakaan mallia ei kuitenkaan voida näyttää toteen käytettävissä olevilla aineistoilla. Tut-kimuksessa pyritään siten vielä problematisoimaan tutkimusasetelman operationalisointiin liittyviä on-gelmakohtia survey-aineistojen suhteen mahdollisten jatkotutkimuksien kannalta.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The overall rate equation for a reaction sequence consisting of a pre-equilibrium and rate-determining steps should not be derived on the basis of the concentration of the intermediate product (X). This is apparently indicated by transition state theory (as the path followed to reach the highest energy transition state is irrelevant), but also proved by a straight-forward mathematical approach. The thesis is further supported by the equations of concurrent reactions as applied to the partitioning of X between the two competing routes (reversal of the pre-equilibrium and formation of product). The rate equation may only be derived rigorously on the basis of the law of mass action. It is proposed that the reactants acquire the overall activation energy prior to the pre-equilibrium, thus forming X in a high-energy state en route to the rate-determining transition state. (It is argued that conventional energy profile diagrams are misleading and need to be reinterpreted.) Also, these arguments invalidate the Michaelis-Menten equation of enzyme kinetics, and necessitate a fundamental revision of our present understanding of enzyme catalysis. (The observed ``saturation kinetics'' possibly arises from weak binding of a second molecule of substrate at the active site; analogous conclusions apply to reactions at surfaces).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is a report of Mr. Haylor's visit to Pakistan to negotiate a Partnership Agreement, agree a National Co-ordinator for STREAM in Pakistan and begin the process of recruiting a Communications Hub Manager. An agreement was also obtained by him for funds from FAO for supporting the establishment of the Communications Hub and to conduct an Aquatic Resources and Poverty Review and a Country Strategy Paper.(PDF contains 22 pages)